I am going to use Tails to connect to Tor through VPN which has AES-256 data encryption, SHA-256 data authentication and RSA-4096 handshake encryption on my Mac on my school's WiFi (as public as I can ...

Why it is not advisable to use JavaScript with Tor? Yet with JavaScript, you cannot get the IP address of the user except through an external website. How could using JavaScript with Tor expose one's ...

I've already asked this question here but as of yet it has no views/answers.
I was wondering if there is any way for Tor to detect high network usage in the context of transferring large files using ...

I have been studying about computer security and at some point i came across the terms of onion routing and crowds. From what i have understood they are very similar in their usage (interchangeable).
...

I have been reading about computer security and at a point it mentioned Lucent Personalized Web Assistant (LPWA). Though I think I understood what it can offer, it doesn't say anywhere how/if a user ...

Recently I have been getting more and more interested in the security (privacy and anonymity) issues of my online life. Not that I have anything to hide, or that what I do online is so interesting to ...

I can't quite figure out the differences between using the Tor browser and using a VPN (like concretely proXPN). From what I understand the idea is the same, that they both hide the IP address. The ...

I've been reading Whonix's documentation and threads here to be more anonymous and secure.
For the best anonymity Whonix recommends having two different computers, one being the gateway and the other ...

I have a website hosted in Azure that uses Active Directory to prevent anyone from accessing it except for a few test users. Now I would like to expose a single page so that anyone can access it.
I've ...

I'm currently working in Kali and I'm trying to boost my security and anonymity online. Please, bear with me for I am no expert yet. Googling and searching here has yielded useful info but not enough ...

I'm currently running QubesOS (so essentially a virtualized Fedora operating system), which I use to access an offshore VPS through I2P (using garliccat). I then route all my traffic through the VPS ...

I realize this question more belongs on the tor exchange (and i have indeed posted it there) so if you want to vote to close this question I completely understand. But I have noticed that this site it ...

If I use a Tor router to browse the regular internet that it has to leave the Tor network through an exit node. Apparently the exit node has all the information from the original user it came from on ...

I was searching for methods or tools to remain completely anonymous on the internet. TOR came up but it is seems that it is far from perfect. Are there any 100% foolproof ways ? Or approximately 100% ...

An anonymous VPN service will typically assign the same public IP address to many VPN users. This procedure ensures that a connection cannot be traced back to the VPN subscriber: behind the veil of ...

I read these questions which had great information: How can I keep my identity anonymous as a website owner/administrator? and How much can I trust Tor?, however I wonder if this is too extreme for my ...

Here's a basic example of the situation I am in:
1.Friend downloads full-length, new release movie on shady internet site (felony).
2.Uploads it to a randomly created, cloud hosting service account ...

My question is not about people who are proficient in hacking. I am wondering about websites run by acquaintances or friends of friends, who can use website analytics services provided by the website ...

This has become a bit of a thought experiment for me.
Suppose someone would like to establish a pseudonym along with a corresponding PGP Key, how could other people verify the correspondence between ...

I want to know how Facebook discovers the people who you know in real life or who know you.
I tried the following to see if Facebook can still discover my acquaintances in real life and suggest them ...

I want to use a prepaid SIM card (text and calls only) anonymously. I bought the SIM card offline without providing any address or name.
I am now thinking about using a dumbphone I bought from Amazon ...

I'm thinking about building a very anonymous forum, where people can comment and upvote each other's comments anonymously. People are supposed to remain anonymous even if the forum's database contents ...

I am looking for a free anonymous encrypted webmail I can access from both tor and the clearnet (i.e., no .onion) that is not based in the U.S., Canada, or in any way connected to a U.S. company.(I ...

iOS, like most other mobile OSs, has the potential to leak significant chunks of personal information to 3rd-party apps and to ad and tracking networks used by those apps, which in turn also has the ...